Help Me Choose: Absolute Data & Device Security

Absolute DDS (formerly Absolute Computrace®) includes Persistence™* technology, which is embedded into the firmware of most Dell PCs and provides a two-way connection to all of your endpoints and the data they contain. This means you’re always in control and can manage mobility, investigate potential threats, take action if a security incident occurs, and prove compliance, even if a device is off your corporate network. These tools and insight are delivered through a cloud-based console that requires no additional IT infrastructure.

Order Absolute DDS factory installed with your Dell system and Absolute Persistence will be activated during the build process.
Three versions of Absolute DDS are available factory installed from Dell

Absolute DDS Professional (compare to Computrace Data Protection)
Includes hardware, software, and security reporting; proactive and custom alerts; event calling; mapping and geofencing; offline device policies; device freeze; remote file retrieval; and data delete capabilities. Also includes SCCM health check and healing and a connector to send security data to SIEM solutions.

Absolute DDS Premium (compare to Computrace Complete)
Includes the enterprise-level benefits of Professional. Extends risk detection with efficient lexicon-based online and offline endpoint data discovery. Also includes threat investigations and device recovery services.

Absolute DDS Premium SLED (for Education, and State and Local Government)
Includes Premium features plus Absolute Safe Schools program and a recovery guarantee up to $1,000*.

The Absolute difference

Lifecycle Security
Apply a layer of security across the entire lifecycle of each device and receive alerts if specific conditions occur. Secure new devices in transit, validate end users, inventory hardware and software, blacklist applications, and set certified end of life data delete protocols.

Risk Assessment
Monitor device activity and status, and receive alerts if specific conditions occur. Locate non-compliant devices, control offline devices, receive blacklisted application install alerts, flag rogue employees, and receive status alerts for encryption, anti-malware, and SCCM.

Risk Response
Remotely invoke security commands and other measures. Send messages to end users, lock and unlock devices, establish chain of custody, conduct internal investigations, remotely retrieve and delete endpoint data, and prove that that endpoint data and corporate networks were not accessed while a device was at risk.

Enterprise Class Architecture
Manage an entire deployment of devices and operating systems from a single cloud-based console. You can run filtered reports across thousands of devices, create and execute commands such as a data delete or device freeze, and set customized alerts. The Absolute global monitoring center is enterprise-grade and ISO certified, with millions of devices contacting the Absolute Monitoring Center daily.

*some conditions apply
Absolute DDS provides a full complement of endpoint security features and remote capabilities so that you can control and secure business data and devices:

Reporting & Analytics Reporting & Analytics
Collect incredibly accurate information from each device, including historical data. Determine if sensitive data is stored on a device. Identify activities and user behavior that could be precursors to a security incident including changes to IP address, location, unauthorized access to sensitive data, non-compliant software/hardware installations; and many more. Receive a notification if these activities occur. 
Geotechnology Geotechnology
Track assets on a Google Map™, including recent and historical locations. Create geofences based on corporate policies. Investigate devices that are out of bounds or entering an unauthorized location. 
Risk Assessment Risk Assessment
Identify risk conditions and receive a notification if these conditions occur. Key security data integrates automatically with SIEM solutions. Scan for sensitive data on the endpoint and tailor your security response based on the results. Validate the status of complementary security applications such as encryption, anti-malware, and SCCM. Use these reports to prove to auditors that security measures were properly implemented and in place at the time of a security incident. 
Risk Response Risk Response
Program the automatic reinstallation of business critical endpoint software applications. Remotely recover or delete data. Set policies to ensure offline devices are automatically protected. Freeze a device and communicate with the user to verify status. Produce an audit log to prove data on a compromised device was properly secured, not accessed, and safely deleted. Use certified data delete workflows to decommission a device. 
Endpoint Investigations Endpoint Investigations
Leverage the Absolute Investigations team to determine the cause of an endpoint security incident. Identify and eliminate insider threats. Refine best practices so the same incident does not reoccur. Determine if data was accessed during an incident, and whether or not a data breach notification is required. Recover stolen devices. 

Absolute lets you set policies and plans of action that suit your business. If you need expert help, Absolute offers services ranging from initial security setup and industry-specific compliance expertise, to expert investigations of suspect devices and security incidents.
What operating systems does Absolute DDS support?
An Absolute DDS license will support Windows, Mac, or Android. Centrally-managed Absolute solutions are available for Chromebooks and iOS*.

I have data encryption. Why do I need Absolute DDS?
Although the data on a missing or stolen device may be protected by encryption, there are scenarios in which you may need more information, the ability to delete data or recover the device, or the ability to conduct remote investigations on compromised systems. You may also need to prove compliance – including encryption status – in order to potentially mitigate penalties or fines.

Why do I need Absolute and Dell for security?
Absolute is designed to address specific needs tied to mobile PC and device security, including the ability to survive OS and hard drive wipes, access any PC over an Internet connection, and carry out remote security measures. Absolute does not include threat prevention or encryption; however, it does provide visibility to threat protection and encryption status through the cloud-based Absolute Customer Center.

Dell Data Security Solutions offers authentication, encryption, and threat prevention in a centrally-managed, server-based console. It is recommended that you have authentication, encryption, and threat prevention; whether you choose a comprehensive suite or opt to obtain these solutions individually.

*some conditions apply